This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Last revision Both sides next revision | ||
blug-canary-2 [2020/04/19 12:51] persmule |
blug-canary-2 [2024/03/31 15:06] persmule |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Beijing GNU/Linux User Group Canary (2/3) ====== | ||
- | |||
< | < | ||
-----BEGIN PGP SIGNED MESSAGE----- | -----BEGIN PGP SIGNED MESSAGE----- | ||
Line 8: | Line 6: | ||
==================================== | ==================================== | ||
- | Issued for April 2020. | + | Issued for March 2024. |
Don't just trust the contents of this file blindly! Verify the | Don't just trust the contents of this file blindly! Verify the | ||
Line 18: | Line 16: | ||
* biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | * biergaizi: 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D | ||
* persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | * persmule : 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60 | ||
- | * wnereiz | + | * vimacs |
THREE DOCUMENTS IN TOTAL. | THREE DOCUMENTS IN TOTAL. | ||
Line 63: | Line 61: | ||
10. We plan to publish the next of these canary statements in the first three | 10. We plan to publish the next of these canary statements in the first three | ||
- | weeks of May 2020. Special note should be taken if no new canary is published | + | weeks of April 2024. Special note should be taken if no new canary is published |
by that time or if the list of statements changes without plausible explanation. | by that time or if the list of statements changes without plausible explanation. | ||
+ | |||
+ | 11. Due to the ongoing security issues of OpenPGP keyservers, it makes signature | ||
+ | verification an issue and somewhat a challenge. For completeness, | ||
+ | procedures for canary verification is included here. | ||
Special Announcements | Special Announcements | ||
~~~~~~~~~~~~~~~~~~~~~~~~ | ~~~~~~~~~~~~~~~~~~~~~~~~ | ||
- | 1. Since mid-October, | + | 1. We've found a workaround for importing keys on https:// |
- | expired. A new key, 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60, | + | without User-ID. The instructions for verifying persmule' |
- | created and uploaded to https:// | + | been added. |
- | this keyserver. | + | |
- | 2. The new key will be used by persmule to sign future warrant canary | + | Canary Verification Procedures |
- | documents. You can verify the signature by crosschecking the other two | + | ~~~~~~~~~~~~~~~~~~~~~~~~ |
- | documents signed by biergaizi and wnereiz for consistency. | + | |
- | 3. Due to this key rollover, the October message was not signed by persmule. | + | 1. To verify biergaizi' |
- | This did/does not indicate a security incident, all of the statements above | + | |
- | were valid, and are still valid. | + | |
- | 4. Recent attacks on OpenPGP | + | a. Obtain the public key from any traditional |
- | within the community, as a countermeasure, | + | https:// |
- | not published to the https:// | + | is 0x255211B2395A5A3E0E48A0F1FAD3EB05E88E8D6D. |
- | cryptographic information can be obtained from the keyserver, without any | + | |
- | User-ID. Currently, it's impossible to import | + | |
- | User-ID to a standard GnuPG installation, | + | |
- | for a 3rd-party to verify the canary document signed by persmule. | + | |
- | 5. We are looking for a solution. But for now, we decided that the best | + | b. Use the latest GnuPG in any operating system. |
- | option is starting publishing new canary documents using the new key. | + | |
- | As a temporary measure, you can check the canary documents signed by | + | |
- | biergaizi and wnereiz to decide the validity of the Statements. By signing | + | |
- | their own copies, it indicates that the new key has been verified privately | + | |
- | by them as valid. | + | |
- | 6. This effectively reduced the number of signers to two people. It reduces | + | 2. To verify persmule' |
- | the level of confidence, but currently there is no alternative option yet. | + | |
- | 7. Once the technical problem of OpenPGP public key without User-ID | + | a. Due to the previous attacks on OpenPGP keyservers, persmule has published |
- | resolved, you can check the previous signatures retroactively, and this | + | |
- | would effectively restore the level of confidence. You can archive | + | the standard method, it' |
- | persmule' | + | |
- | ensure no data tampering has occured. | + | below. |
- | 8. Unlike persmule, biergaizi | + | b. Obtain the dummy public key from any traditional OpenPGP Keyserver, |
- | but the Key-IDs have been changed to its full fingerprint format | + | such as https:// |
- | canary document for clarity. | + | fingerprint is 0xEDFFE248ECFACDE3C805906804A40D21DBB89B60. Note that, to |
+ | | ||
+ | website to a file or console and use the command "gpg --import" | ||
+ | technical problem, Using "gpg --recv-key" | ||
+ | work. | ||
- | 9. When new information | + | c. This is a special dummy public key with its User-IDs and subkeys stripped |
- | Announcements" | + | that we specifically created, leaving only a " |
+ | E-mail address, " | ||
+ | allowing the subsequent import of additional subkeys. | ||
+ | |||
+ | d. Next, with the stub key already imported, obtain the public key from | ||
+ | https:// | ||
+ | Because the dummy key with its stub User-ID is already in presence, it's | ||
+ | now possible to import the https:// | ||
+ | |||
+ | e. Use the latest GnuPG in most operating system, | ||
+ | | ||
+ | other systems should work just fine, but not Fedora. The subkeys contains | ||
+ | signatures made with Brainpool curves, which are disabled on Fedora due to | ||
+ | potential patent-licensing problems, causing a "Unknown elliptic curve" | ||
+ | error. | ||
+ | |||
+ | 3. To verify vimacs' | ||
+ | |||
+ | a. Obtain the public key from any traditional OpenPGP Keyserver, such as | ||
+ | https:// | ||
+ | is 0x7079B481F04B5D8B65A0ECDEEA2DB82FE04A9403. | ||
+ | |||
+ | b. Use the latest GnuPG in any operating system. | ||
Proof of Freshness | Proof of Freshness | ||
Line 117: | Line 131: | ||
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
- | What essential shops are open during the coronavirus lockdown? | + | Tuesday evening news briefing: Biden vows to move heaven and earth to rebuild Baltimore bridge |
- | Watch: Can you get coronavirus twice? | + | Monday evening news briefing: UK unveils sanctions after MPs targeted by China |
- | 'I can't get an online home delivery slot - what should I do?' Coronavirus Q&A | + | Thursday evening news briefing: Waspi scandal compensation branded a betrayal |
- | These are the NHS workers who have died from coronavirus | + | Wednesday evening news briefing: Leo Varadkar resigns as Irish prime minister |
- | What is coronavirus, | + | Tuesday evening news briefing: HMRC to close phone lines for six months every year |
$ rsstail -1 -n5 -N -u https:// | $ rsstail -1 -n5 -N -u https:// | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
+ | | ||
$ date -R -u | $ date -R -u | ||
- | Sun, 19 Apr 2020 12:49:15 +0000 | + | Wed, 27 Mar 2024 13:10:15 +0000 |
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | ||
- | iQEzBAEBCgAdFiEEwonfPqgFyacM7J3iwYAPuUJ74CEFAl6cSPAACgkQwYAPuUJ7 | + | iQIzBAEBCgAdFiEEDfvrUpjKhXrxhHZrG+3+G67tLh4FAmYEGr4ACgkQG+3+G67t |
- | 4CHIaQf/WgyGPYYA+cx9U129nxuPUi27x1BEVYoTaNsA2gsp732R4uH34s2yqz7V | + | Lh6LzQ/9FJvRBpndCMu4hNzwO24k62YqAexHgaHi/ |
- | urWULpNZWYA7+k+kFF5zUOfmbDNjwKFVYV9Fd+UXxTwQUMtbF9cudkohduwD09Im | + | COW5UPMsmq3ZPGgZ4BlvOvV7OAl2V6TaW5N38NkV7Ao9jq2o35E/ |
- | 8XPr2A8nQWbRr3r4nIlyev9rHqRZkld73i1o4IG9BvWhAimAe3X0NY1VBeVoD+Ra | + | APN6OJsCTaXB89XNoU+doT3P6aBNR85Dab+7asm1sJiJaKv+MB9wcfd2a9fkvvbx |
- | etDipf/xrVHPAjTM8fe6dloIMkTEZLFthOcX269qtSBcPjitHSQzcpGA7IJCL5UR | + | Cdwd/ |
- | W1xzjnLy71l5IbhHVRrknNbXKvve5VBUsSztGfh9DlTyvucERFd+kZJJUZw/XWRC | + | JjW0vyriI8d0huqT3i46boU8qWmieIASTYllX5zjBLqHOt+rhVwxVvopylq3Ug5d |
- | b0bIvNTSxTgdxTxxx1MV/oTNgsqcBg== | + | AgXxMrXnPiM0WnjW7iyNxrXikg90Y9OMgtbmJ/9LZmjPGhCroDnCq3ODoF57VFEj |
- | =unrx | + | eauTIY+AZB5evlcnHdA2KS6Vcbb6tnTyzdELUTmt8cGvHdm62s30lPBqrw6ck4FB |
+ | pdrmWjIFbQnxOliq+ZqbWRdYBbKrDkoPi+9Ogd9978bluNaRlrjqJ23IN0X8vFog | ||
+ | j707xVZXGrpliu7/vJHwifRYPJm5N36Gx15Q+GjomgWR7KZjWtdHsvohzll+6z6m | ||
+ | +Ty18wdh1fDwIz5/gIZoKlCUzZvcoV/ | ||
+ | QoHH+ccE8yqtxN82qFku1Mhw2NlEzCKqSPb9aS1kDfk2Uxpt634= | ||
+ | =RoJ+ | ||
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | ||
</ | </ |